System initializing…

Resources

Knowledge, not marketing

We publish material that our own operators and CISOs actually use: playbooks, checklists, concise intelligence briefs and regulatory guidance.

Operational playbooks

Operator-level runbooks that describe the exact steps our teams take in the first 24 hours of a major incident or red team finding.

  • · „First 24 hours after a ransomware detonation in a regional bank.“
  • · „Containment playbook for business e-mail compromise with payment fraud exposure.“
  • · „Cloud account takeover: minimal viable actions for security and finance teams.“

Intelligence briefs

Condensed threat intelligence for executives who need the business impact of complex activity without jargon.

  • · Ransomware trends in Central and Eastern Europe and what they mean for mid-size organisations.
  • · Targeted extortion against logistics, transport and critical suppliers in the region.
  • · Realistic threat models for financial institutions and payment-heavy businesses.

Executive checklists

Board-ready checklists that help non-technical leaders ask disciplined, concrete questions.

  • · „What to ask your CISO after a major incident – a practical agenda for the first board session.“
  • · „Vendor due diligence shortcuts that still respect your risk appetite and regulation.“
  • · „Cloud security posture: ten questions that actually change how teams work.“

Compliance & regulation briefings

Guidance on GDPR, DORA and NIS2 that connects legal language with concrete technical and organisational controls.

  • · GDPR: mapping real data flows and technical measures, not just paper policies.
  • · DORA: making incident response, testing and reporting requirements work with your existing teams.
  • · NIS2: prioritising investments for operators of essential and important entities.

Templates & working aids

Pragmatic artefacts that security and risk teams can adapt in hours, not weeks.

  • · Incident briefing template for boards and regulators.
  • · Tabletop exercise scenarios tailored to banks, fintechs and critical infrastructure.
  • · Risk register examples aligned with cyber, operational and regulatory risk.